Jovan Dj. Golic

According to our database1, Jovan Dj. Golic authored at least 104 papers between 1987 and 2013.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
Key Agreement over a Generalized Multiple Access Channel Using Noiseless and Noisy Feedback.
IEEE J. Sel. Areas Commun., 2013

Multi-party metering: An architecture for privacy-preserving profiling schemes.
Proceedings of the Sustainable Internet and ICT for Sustainability, 2013

Cryptanalytic Attacks on MIFARE Classic Protocol.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

2012
A new authentication model for ad hoc networks.
Int. J. Inf. Sec., 2012

2011
Key Agreement Over Multiple Access Channel.
IEEE Trans. Inf. Forensics Secur., 2011

2009
Moving dispersion method for statistical anomaly detection in intrusion detection systems.
ISC Int. J. Inf. Secur., 2009

Optimal correlation attack on the multiplexer generator.
Inf. Process. Lett., 2009

2008
Entropy Analysis and New Constructions of Biometric Key Generation Systems.
IEEE Trans. Inf. Theory, 2008

Iterative Probabilistic Reconstruction of RC4 Internal States.
IACR Cryptol. ePrint Arch., 2008

2007
Exact Probabilistic Analysis of Memoryless Combiners.
IEEE Trans. Inf. Theory, 2007

Techniques for Random Masking in Hardware.
IEEE Trans. Circuits Syst. I Regul. Pap., 2007

High-Speed True Random Number Generation with Logic Gates Only.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

Soft Generation of Secure Biometric Keys.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Statistical distinguishers for irregularly decimated linear recurring sequences.
IEEE Trans. Inf. Theory, 2006

Vectorial Boolean functions and induced algebraic equations.
IEEE Trans. Inf. Theory, 2006

New Methods for Digital Generation and Postprocessing of Random Data.
IEEE Trans. Computers, 2006

2005
Embedding probabilities for the Alternating Step Generator.
IEEE Trans. Inf. Theory, 2005

Techniques for random maskin in hardware.
IACR Cryptol. ePrint Arch., 2005

Vectorial Approach to Fast Correlation Attacks.
Des. Codes Cryptogr., 2005

Characterisations of Extended Resiliency and Extended Immunity of S-Boxes.
Proceedings of the Information Security and Cryptology, 2005

2004
Vectorial fast correlation attacks.
IACR Cryptol. ePrint Arch., 2004

New paradigms for digital generation and post-processing of random data.
IACR Cryptol. ePrint Arch., 2004

Correlation Analysis of the Alternating Step Generator.
Des. Codes Cryptogr., 2004

A Weakness of the Linear Part of Stream Cipher MUGI.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004

2003
Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators.
J. Cryptol., 2003

A new statistical distinguisher for the shrinking generator.
IACR Cryptol. ePrint Arch., 2003

On the Success of the Embedding Attack on the Alternating Step Generator.
Proceedings of the Selected Areas in Cryptography, 10th Annual International Workshop, 2003

On the Resynchronization Attack.
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003

DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

2002
Computation of Edit Probabilities and Edit Distances for the A5-Type Keystream Generator.
J. Complex., 2002

Multiplicative Masking and Power Analysis of AES.
IACR Cryptol. ePrint Arch., 2002

Analysis of a measure of correlation between two binary strings of different lengths.
Australas. J Comb., 2002

Linear Cryptanalysis of Bluetooth Stream Cipher.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Multiplicative Masking and Power Analysis of AES.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

The LILI-II Keystream Generator.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
Iterative optimum symbol-by-symbol decoding and fast correlation attacks.
IEEE Trans. Inf. Theory, 2001

Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory.
IEEE Trans. Inf. Theory, 2001

A probabilistic cryptanalytic method for a time-variant permutation generator.
Inf. Process. Lett., 2001

How to Construct Cryptographic Primitives from Stream Ciphers.
Comput. Secur., 2001

Correlation Analysis of the Shrinking Generator.
Proceedings of the Advances in Cryptology, 2001

2000
A method for convergence analysis of iterative probabilistic decoding.
IEEE Trans. Inf. Theory, 2000

Cryptanalysis of three mutually clock-controlled stop/go shift registers.
IEEE Trans. Inf. Theory, 2000

Generalized Inversion Attack on Nonlinear Filter Generators.
IEEE Trans. Computers, 2000

Fast Correlation Attacks on the Summation Generator.
J. Cryptol., 2000

LILI Keystream Generator.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Modes of Operation of Stream Ciphers.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Correlation Attacks on Up/Down and Stop/Go Cascades.
IEEE Trans. Inf. Theory, 1999

Linear models for a time-variant permutation generator.
IEEE Trans. Inf. Theory, 1999

Comment on 'Relations Between Entropy and Error Probability'.
IEEE Trans. Inf. Theory, 1999

Methods for testing subblock patterns.
Stat. Comput., 1999

A Fast Correlation Attack on Multiplexer Generators.
Inf. Process. Lett., 1999

Stream Cipher Encryption of Random Access Files.
Inf. Process. Lett., 1999

Inversion Attack and Branching.
Aust. Comput. J., 1999

Edit Probability Correlation Attack on the Bilateral Stop/Go Generator.
Proceedings of the Cryptography and Coding, 1999

1998
Periods of Interleaved and Nonuniformly Decimated Sequences.
IEEE Trans. Inf. Theory, 1998

On Matroid Characterization of Ideal Secret Sharing Schemes.
J. Cryptol., 1998

Random correlation matrices.
Australas. J Comb., 1998

Edit Probability Correlation Attack on the Alternating Step Generator.
Proceedings of the Sequences and their Applications, 1998

A Probabilistic Correlation Attack on the Shrinking Generator.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

Correlation Attacks on Up/Down Cascades.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Automated statistical methods for measuring the strength of block ciphers.
Stat. Comput., 1997

Fast Correlation Attacks on Nonlinear Filter Generators.
Inf. Process. Lett., 1997

Cryptanalysis of Alleged A5 Stream Cipher.
Proceedings of the Advances in Cryptology, 1997

Linear Statistical Weakness of Alleged RC4 Keystream Generator.
Proceedings of the Advances in Cryptology, 1997

Edit Distance Correlation Attack on the Alternating Step Generator.
Proceedings of the Advances in Cryptology, 1997

Fast Correlation Attacks and Multiple Linear Approximations.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators.
IEEE Trans. Computers, 1996

Linear Models for Keystream Generators.
IEEE Trans. Computers, 1996

Constrained Embedding Probability for Two Binary Strings.
SIAM J. Discret. Math., 1996

Correlation Properties of a General Binary Combiner with Memory.
J. Cryptol., 1996

On the Security of Nonlinear Filter Generators.
Proceedings of the Fast Software Encryption, 1996

A Comparison of Fast Correlation Attacks.
Proceedings of the Fast Software Encryption, 1996

Fast Low Order Approximation of Cryptographic Functions.
Proceedings of the Advances in Cryptology, 1996

Edit distance correlation attacks on clock-controlled combiners with memory.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

On period of multiplexed sequences.
Proceedings of the Information Security and Privacy, First Australasian Conference, 1996

1995
Constrained Many-to-One String Editing with Memory.
Inf. Sci., 1995

Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers.
Proceedings of the Advances in Cryptology, 1995

Randomness Measures Related to Subset Occurrence.
Proceedings of the Cryptography: Policy and Algorithms, 1995

Discrete Optimisation and Fast Correlation Attacks.
Proceedings of the Cryptography: Policy and Algorithms, 1995

A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps.
Proceedings of the Cryptography: Policy and Algorithms, 1995

A Note on Nonuniform Decimation of Periodic Sequences.
Proceedings of the Cryptography: Policy and Algorithms, 1995

1994
Linear Cryptanalysis of Stream Ciphers.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers.
Proceedings of the Advances in Cryptology, 1994

A Unified Markow Approach to Differential and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

Intrinsic Statistical Weakness of Keystream Generators.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
String editing under a combination of constraints.
Inf. Sci., 1993

On the Security of Shift Register Based Keystream Generators.
Proceedings of the Fast Software Encryption, 1993

1992
Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence.
Proceedings of the Advances in Cryptology, 1992

A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance.
Proceedings of the Advances in Cryptology, 1992

Correlation via Linear Sequential Circuit Approximation of Combiners with memory.
Proceedings of the Advances in Cryptology, 1992

1991
A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance.
J. Cryptol., 1991

A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction.
Proceedings of the Advances in Cryptology, 1991

The Number of Output Sequences of a Binary Sequence Generator.
Proceedings of the Advances in Cryptology, 1991

1990
Correction to 'A lower bound on the redundancy of D-ary Huffman codes' (Nov 87 910-911).
IEEE Trans. Inf. Theory, 1990

Minimal linear equivalent analysis of a variable-memory binary sequence generator.
IEEE Trans. Inf. Theory, 1990

A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach.
Proceedings of the Advances in Cryptology, 1990

A Fast Iterative Algorithm For A Shift Register Initial State Reconstruction Given The Nosiy Output Sequence.
Proceedings of the Advances in Cryptology, 1990

1989
On the linear complexity of functions of periodic GF(q) sequences.
IEEE Trans. Inf. Theory, 1989

1988
On the linear complexity of nonuniformly decimated PN-sequences.
IEEE Trans. Inf. Theory, 1988

1987
A lower bound on the redundancy of D-ary Huffman codes.
IEEE Trans. Inf. Theory, 1987

On the relationship between the separability measures and the Bayes probability of error.
IEEE Trans. Inf. Theory, 1987

On the relationship between the information measures and the Bayes probability of error.
IEEE Trans. Inf. Theory, 1987

On the relationship between the efficiency measures of multicategory information systems.
IEEE Trans. Inf. Theory, 1987


  Loading...